applsci-logo

Journal Browser

Journal Browser

Recent Advances in Steganography and Multimedia Security

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (22 August 2022) | Viewed by 6742

Special Issue Editors

Department of Computer Science, College of Information Science & Technology, University of Nebraska at Omaha, Omaha, NE 68182, USA
Interests: computer vision; image processing and analysis; pattern recognition
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA
Interests: artificial intelligence; deep learning; image processing; watermarking and steganography; digital forensics; pattern recognition; bioinformatics; biomedical engineering; fuzzy logic; neural networks
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

As an increasing demand for secured multimedia, such as secured communication channels in images, texts, and audios, this special issue invites original work from researchers, scientists, and academicians to report the latest advances in Steganography and Multimedia Security, including but not limited to theory, algorithm, application, design, implementation, and case study. Related interdisciplinary studies are also welcomed. The authors should demonstrate that the part of Multimedia Security is predominant in their works, and it is direct towards the implementation of new ideas. Particularly welcome will be works that integrate different emerging methods, such as artificial intelligence and machine learning, to address current difficulties in Steganography and Multimedia Security. Other closely related areas, such as Digital Watermarking, Data Hiding, and Cover Channels for Secured Multimedia, will also be prioritized. The participation of leading researchers will open up possibilities for exploring the related and important extensions of this area.

Dr. Xin Zhong
Dr. Frank Y. Shih
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • steganography
  • multimedia security
  • steganalysis
  • watermarking
  • data hiding
  • emerging techniques for secured multimedia
  • applications in multimedia security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

30 pages, 54438 KiB  
Article
Stripe-Based Futurism-like Image—A New Type of Art and Its Application to Covert Communication
by Shan-Chun Liu, Da-Chun Wu and Wen-Hsiang Tsai
Appl. Sci. 2022, 12(20), 10422; https://doi.org/10.3390/app122010422 - 15 Oct 2022
Viewed by 1529
Abstract
The generation of art images using computers has been studied recently. A new type of art image called a stripe-based Futurism-like image, and its application to covert communication, are proposed. Firstly, a source image is segmented into regions. The region corners are extracted [...] Read more.
The generation of art images using computers has been studied recently. A new type of art image called a stripe-based Futurism-like image, and its application to covert communication, are proposed. Firstly, a source image is segmented into regions. The region corners are extracted by chain code analysis, and polygon approximation is conducted accordingly to simplify the region shapes. Then, each region is partitioned into stripes according to the region direction and the stripes are filled with the region’s average color, or the color white alternatively, resulting in an image with the abstraction and dynamism of Futurism. Furthermore, a data hiding method is proposed to embed a secret message into the created art image by filling the stripes with the aforementioned colors in a message-dependent fashion, with the message bits being adjusted beforehand by a 2-to-3 mapping scheme to avoid filling a region’s stripes with consecutive identical colors. Furthermore, hidden data security is enhanced by randomizing both the message-bit embedding order and the region processing sequence via the use of a secret key. By processing a database of 100 images, good experimental results of art image creation and secure message hiding have been obtained, showing the feasibility of the proposed methods for covert communication. Full article
(This article belongs to the Special Issue Recent Advances in Steganography and Multimedia Security)
Show Figures

Figure 1

23 pages, 106249 KiB  
Article
SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain
by Rui Bai, Li Li, Shanqing Zhang, Jianfeng Lu and Chin-Chen Chang
Appl. Sci. 2022, 12(19), 9780; https://doi.org/10.3390/app12199780 - 28 Sep 2022
Cited by 10 | Viewed by 2329
Abstract
Mobile devices have been increasingly used to take pictures without leaving a trace. However, the application system can lead to confidential information leaks. A framework for screen-shooting-resilient watermarking via deep networks (SSDeN) in the frequency domain is put forward in this study to [...] Read more.
Mobile devices have been increasingly used to take pictures without leaving a trace. However, the application system can lead to confidential information leaks. A framework for screen-shooting-resilient watermarking via deep networks (SSDeN) in the frequency domain is put forward in this study to solve this problem. The proposed framework can extract the watermark from the leaked photo for copyright protection. SSDeN is an end-to-end process that combines convolutional neural network (CNN) with residual block to embed and extract watermarks in the DCT domain. We simulate some screen-shooting attacks to ensure the networks embed the watermark robustly. Our framework achieves the state-of-the-art performance on existing learning architectures for screen-shooting-resilient watermarking. Full article
(This article belongs to the Special Issue Recent Advances in Steganography and Multimedia Security)
Show Figures

Figure 1

10 pages, 2929 KiB  
Article
Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
by Yi-Hui Chen, Pei-Yu Lin, Hsin-Pei Wu and Shih-Hsin Chen
Appl. Sci. 2022, 12(4), 1966; https://doi.org/10.3390/app12041966 - 14 Feb 2022
Cited by 1 | Viewed by 1571
Abstract
Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential [...] Read more.
Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential within certain fields (such as medicine and the military), sensitive images must be completely decrypted back into the original images. However, an encrypted image is a noise-like pattern that is meaningless to a user; thus, it is difficult for a user to find the accurate image they desire. Take keywords as search indexes and embed them in encrypted images for encrypted image retrieval as an example. This idea has been extended by Chen and Line’s scheme to achieve higher capacity with reversibility. The proposed scheme adjusts the coding results according to smooth and complex images to increase its hiding capacity. In addition, two thresholds are designed to adjust the predicted pixel value to be close to the original one. Experiments show that compared with the other schemes, the proposed method achieves superior results. In addition, a hidden encrypted image can be extracted from the cover image. Afterward, the hidden secrets can be completely extracted, and sensitive images can also be perfectly restored. Full article
(This article belongs to the Special Issue Recent Advances in Steganography and Multimedia Security)
Show Figures

Figure 1

Back to TopTop